최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털융복합연구 = Journal of digital convergence, v.13 no.8, 2015년, pp.133 - 144
In digital convergence environment, information security management plays crucial role in maintaining firms' competitiveness. Organizational citizenship behavior(OCB) enables informations security countermeasures to be more effectively worked by helping employees to have much knowledge of informatio...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
핵심어 | 질문 | 논문에서 추출한 답변 |
---|---|---|
사회 공학적 정보보안 침해사고가 점점 증가하고 있는 것이 의미하는 것은? | 특히 정보보안 대책 준수에 대한 인식이 부족하거나 악의 적인 의도를 지닌 기업 구성원(정보시스템 관리자, 일반 관리자 등)에 의해 발생하는 정보보안 침해사고가 점점 증가하고 있다[1]. 이는 기업이 정보보안 시스템 확충(기술적 능력)과 정보보안 관리체계 도입(관리 능력) 만으로 기업의 정보보안 능력을 강화하는데 한계가 있음을 의미 한다. | |
정보보안 사고를 줄이기 위한 조직시민 행동 효과는? | 이러한 조직시민행동은 조직원의 마찰을 줄이고, 유연성을 제고하며, 좋은 조직 문화 및 심리적 배경을 형성하고, 조직의 효율성과 효과성을 향상시킨다[14].실례로 조직시민행동 수준이 높은 정보시스템 업무 담당자(IS personnel)는 직무 생산성과 변화하는 환경에 대한 적응 능력이 높다[14]. 또한 조직구성원의 양심(consciousness) 과 친화성(agreeableness)에 따라 정보보안 소프트웨어 수용의도가 수용행위로 연결되는 정도가 차이가 나는 것으로 밝혀졌다[15]. 이러한 내용을 종합해 볼 때, 조직시민행동은 기업 구성원이 정보보안 대책을 인식한 후 정보보안준수 의도를 갖는데 중요한 매개역할을 할 수 있다 본다. | |
융 복합 시대 도래로 인한 옴니 채널 환경에서 기술적 및 관리적 정보보안대책 확충과 더불어 매우 중요한 것은? | 융 복합 시대 도래로 인한 옴니 채널 환경에서 기술적 및 관리적 정보보안대책 확충과 더불어 기업구성원의 자발적 참여를 통해 정보보안대책이 효과적으로 실행되는 것이 매우 중요하다. 이러한 맥락에서 기업구성원이 정보보안대책 인식 이후 자발적으로 조직시민행동을 전개하면 정보보안 대책에 대한 준수의도가 형성될 것으로 본다. |
H. B. Kim, D. S. Lee, & S. Ham, Impact of hotel information security on system reliability, International Journal of Hospitality Management, Vol. 35, pp. 369-379, 2013.
Y. H. Kim, An Implementation of Audit System Applying Forensic Analysis Technology Over Network Node, Journal of Society for e-Business Studies, Vol. 4, No. 1, pp. 169-181, 2009.
J. M. Do & J. Kim, A Study on Critical Success Factors for Enterprise Security Collaboration, Journal of Digital Convergence, Vol. 12, No. 10, pp. 235-242, 2014.
B. Bulgurcu, H. Cavusoglu, & I. Benbasat, Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance. AMCIS 2009 Proceedings, 419, 2009.
J. H. Ahn, J. H. Park, G. M. Sung, & J. H. Lee, Impacts of Punishment and Ethics Training on Information Security Compliance: Focus on the Moderating Role of Organizational Type. Information Systems Review, Vol. 12, pp. 23-42, 2010.
S. H. Kim & S. Y. Park, Influencing Factors for Compliance Intention of Information Security Policy, Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 34-51, 2011.
M. S. Yim, A Path Way to Increase the Intention to Comply with Information Security Policy of Employees, Journal of Digital Convergence, Vol. 10, No. 10, pp. 119-128, 2012.
M. S. Yim & K. H. Han, An Investigation of the Factors that Influence the Compliance to Information Security Policy : From Risk Compensation Theory, Journal of Digital Convergence, Vol. 11, No. 10, pp. 153-168, 2013.
M. J. Baek & S. H. Sohn, A Study on the Effect of Information Ethics on the Information Security Awareness and Behavior in Organization, Koreanische Zeitschrift fur Wirtschaftswissenschaften, Vol. 28 No. 4, pp. 119-145, December 2010.
T. S. Jung, M. S. Yim, & J. B. Lee, A Development of Comprehensive Framework for Continuous Information Security, Journal of Digital Convergence, Vol. 10, No.2, pp. 479-498, 2012.
D. W. Organ, Organizational Citizenship Behavior: The Good Soldier Syndrome: Lexington books, 1988.
D. W Organ, P. M. Podsakoff, & S. B. MacKenzie, Organizational Citizenship Behavior: Its Nature, Antecedents, and Consequences: Sage Publications, Inc., 2006.
T. Y. Chou, S. C. T. Chou, J. J. Jiang, & G. Klein, The organizational citizenship behavior of IS personnel: Does organizational justice matter?, Information & Management, Vol. 50, pp. 105-111, 2013.
J. Shropshire, M. Warkentin, & S. Sha, Personality, attitudes, and intentions: Predicting initial adoption of information security behavior, Computers & Security, Vol. 49, pp. 177-191, 2015.
R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, & R. Baskerville, Future directions for behavioral information security research. Computers & Security, Vol. 32, pp. 90-101, 2013.
P. Ifinedo, Information systems security policy compliance: An empirical study of the effects of socialization, influence, and cognition. Information & Management, Vol. 51, No. 1, pp. 69-79, 2014.
S. G. Lee & M. S. Chae, An Study on the Factors that Motivate The Compliance of the Organizational Security Policy. Korean Journal of Business Administration, Vol. 27, No. 6, pp. 927-953, 2014.
M. S. Yim, The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees in Financial Firms, Journal of the Korea Service Management Society, Vol. 14, No. 1, pp. 143-171, 2013.
A. Hovav & J. D'Arcy, Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea. Information & Management, Vol. 49, No. 2, pp. 99-110, 2012.
C. L Anderson & R. Agarwal, Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS quarterly, Vol. 34, No. 3, pp. 613-643. 2010.
B. Bulgurcu, H. Cavusoglu, & I. Benbasat, Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness, MIS quarterly, Vol. 34, No. 3, pp. 523-548, 2010.
T. Bateman & D. Organ, Job Satisfaction and the Good Soldier: The Relationship between Affect and Employee Citizenship. Academy of Management Journal, Vol. 26, No. 4, pp. 587-595, 1983.
J. W. Graham & L. V. Dyne, Gathering information and exercising influence: Two forms of civic virtue organizational citizenship behavior. Employee Responsibilities and Rights Journal, Vol. 18, No. 2, pp. 89-109, 2006.
D. W Organ, The Motivational Basis of Organizational Citizenship Behavior. Research in Organizational Behavior, Vol. 12, No. 1, pp. 43-72, 1990.
D. J. Koys, The effects of employee satisfaction, organizational citizenship behavior, and turnover on organizational effectiveness: a unit-level, longitudinal study, Personnel Psychology, Vol. 54, No. 1, pp. 101-114, 2001.
P. M. Podsakoff & S. B. MacKenzie, Organizational citizenship behaviors and sales unit effectiveness, Journal of Marketing Research, Vol. 31, No. 3, pp. 351-363, 1994.
P. M. Podsakoff, M. Ahearne, & S. B. MacKenzie, Organizational citizenship behavior and the quantity and quality of work group performance, Journal of Applied Psychology, Vol. 82, No. 2, pp. 262-270, 1997.
H. J. R. Yen & B. P. Niehoff, Organizational citizenship behaviors and organizational effectiveness: examining relationships in Taiwanese banks, Journal of Applied Social Psychology, Vol. 34, No. 8, pp. 1617-1637, 2004.
S. C. Yang & C. K. Farn, Exploring tacit knowledge sharing intention and behavior within workgroup from the perspectives of social capital and behavioral control. PACIS 2007 Proceedings, 38, 2007.
H. R. Yen, E. Y. Li, Brian, & P. Niehoff, Do organizational citizenship behaviors lead to information system success?: Testing the mediation effects of integration climate and project management, Information & Management, Vol. 45, No. 6, pp. 394-402, 2008.
C. Yoon, The effects of organizational citizenship behaviors on ERP system success, Computers in Human Behavior, Vol. 25, No. 2, pp. 421-428, 2009.
K. L. Thomson, Rossouw von Solms, & Lynette Louw, Cultivating an organizational information security culture, Computer Fraud & Security, Vol. 10, pp. 7-11, 2006.
S. Goel & I. N. Chengalur-Smith, Metrics for characterizing the form of security policies. The Journal of Strategic Information Systems, Vol. 19, No. 4, pp. 281-295, 2010.
T. Dinev, J. Goo, Q. Hu, & K. Nam, User Behaviour towards Protective Information Technologies: The Role of National Cultural Differences. Information Systems Journal, Vol. 19, No. 4, pp. 391-412. 2009.
J. D'Arcy, A. Hovav, & D. Galletta, User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, Vol. 20, No. 1, pp. 79-98, 2009.
S. M. Lee, S. G. Lee, & S. Yoo, An integrative model of computer abuse based on social control and general deterrence theories. Information & Management, Vol. 41, No. 6, pp. 707-718, 2004.
C. J. Park & M. S. Yim. An Understanding of Impact of Security Countermeasures on Persistent Policy Compliance. Journal of Digital Convergence, Vol. 10, No. 4, pp. 23-35, 2012.
T. Herath, & H. R. Rao, Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, Vol. 47, No. 2, pp. 154-165, 2009.
W. Chin, B. Marcolin, & P. Newsted, A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, Vol. 14, No. 2, pp. 189-217, 2003.
C. Fornell & D. Larcker, Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing Research, Vol. 18, No. 1. pp. 39-50, 1981.
M. Wetzels, Using PLS path modeling for assessing hierachical construct models: Guidelines and empirical illustration, MIS Quarterly, Vol. 33, No. 1, pp. 177-195, 2009.
M. Sobel, Asymptotic confidence intervals for indirect effects in structural equation models. Sociological methodology, Vol. 13, pp. 290-312, 1982.
R. M. Baron & D. A. Kenny, The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, Vol. 51, No. 6, pp. 1173-1182, 1986.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.